In a press release last year, Carahsoft announced FTP Today has joined the Carahsoft Cloud Purchasing Program (CPP). The program is for government contractors who rely on CarahPoints to purchase the software and tools necessary to run their business. Continue reading to find out what this could mean for you!
On more than one occasion, our clients have asked if it’s possible to map files directly to a computer drive from the FTP Today application, whether that be The FTP Cloud or the GOVFTP Cloud. The process of this is called ‘drive mapping’ throughout the industry, and it is simple to accomplish. Today, we’re going to walk you through how drive mapping works, options for drive mapping, and finally, how to do so with FTP Today.
Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.
Recently, FTP Today launched a new feature as part of our platform called an Application Programming Interface, otherwise known as an API. Don’t be intimidated by the name! An API is useful for many things, and if your organization has access, it’s something you should take advantage of. This blog is meant to give an overview of what an API is and how it works.
In recent years, FTP Today has received many questions from our customer base regarding Single Sign-On, otherwise known as SSO. This blog is meant to educate the reader on definitions and use cases as the technology has become widely adopted across organizations of all sizes for administration and security purposes.
Are you looking for a secure FTP hosting option or a file sharing solution that will fit your company's needs? A simple internet search will show you the sheer number of options available. How will you choose the right one? A smart way to ensure you pick the ideal file sharing solution for your business is to schedule free trials, so you get a feel for the solution and its capabilities. This is called Proof of Concept (P.O.C.). It’s also wise to see how each solution stacks up against the competition. Let’s look at the Pros and Cons of different secure file sharing solutions and their Free Trials to determine which one is ideal for your business. Here are the top players, listed alphabetically.
You might be asking yourself, “why are collaboration platforms competing with Managed File Transfer (MFT)?” Great question. Normally, they don’t, and to be honest -- they shouldn’t. These are not the same. The commonality regarding these two is mainly that files can be stored or sent within MFT and MFT as-a-Service (MFTaaS) platforms, as well as within collaboration platforms. However, as we’ll see later, it’s not without difficulty if you’re trying to use a collaboration tool like Microsoft O365 as a MFTaaS tool.
FTP (File Transfer Protocol) has been a leading option in file transfers for a long time. However, looking at the complexity of data security compliance standards and the capabilities of data hackers, a stronger and more secure solution can be required. As technology advances (and hackers’ skills advance in parallel), you need the best file transfer option to keep data protected.
File sharing options and acronyms can often be overwhelming to keep track of as the digital world continues to advance. With so many to choose from – FTP, SFTP, FTPS, HTTPS, EFSS, Collaboration Systems and more – it can be a challenge to distinguish between the options and select the best one for your organization. This is why so many companies default to using FTP (file transfer protocol) – one of the oldest and most basic forms of sharing data via the Internet.
When it comes to file sharing, nothing is more important than security. But when there are so many solutions on the market, it can be difficult to determine which option will best meet your needs.
Cybersecurity is a widespread concern, the aerospace industry being no exception. In fact, in 2016 only 40% of aerospace and defense companies said they have a comprehensive set of security policies in place. That’s a surprisingly low number when you consider the major ramifications that could result from a data security breach. As cybersecurity threats grow more common and more sophisticated, it’s vital that aerospace and defense companies understand the government recommendations in place related to data security and how to comply with those recommendations.